Jump to content

Runbooks: Difference between revisions

From Archive
Creating Runbooks documentation from contingency planning notes
 
Added Runbooks navigation
 
(2 intermediate revisions by the same user not shown)
Line 1: Line 1:
'''Runbooks''' are systematic procedure guides designed for handling specific crisis scenarios and emergency situations. The concept emphasizes actionable protocols over information storage, providing step-by-step procedures that can be executed under stress.
'''Runbooks''' are field-tested emergency procedures designed for independent journalists, field workers, and anyone operating alone in remote locations. Each runbook provides step-by-step protocols that can be executed under stress.


== Philosophy ==
== Core Emergency Runbooks ==


Runbooks operate on the principle of separating sensitive information storage from procedural guidance. This approach ensures that procedures remain accessible and executable even when primary systems are compromised, while keeping sensitive data secured separately.
=== [[Vehicle Failure Runbook]] ===
Complete procedures for handling transportation breakdowns during field operations, including safety assessment, damage evaluation, insurance procedures, alternative transportation, and work continuity planning.


The system is designed to be simple enough to use during a crisis but comprehensive enough to handle complex situations.
=== [[Digital Security Incident Runbook]] ===
Comprehensive response protocols for account compromises, device theft, and system access loss, covering immediate isolation, account recovery, source protection, and system restoration.


== System Architecture ==
=== [[Solo Medical Emergency Runbook]] ===
Emergency medical procedures for serious illness or injury when working alone, including self-assessment, emergency response, evacuation procedures, and work continuity measures.


=== Dual-Component Design ===
=== Equipment Theft/Loss Runbook ===
''(Planned - procedures for securing systems after equipment theft, insurance claims, replacement workflows, and maintaining operational security)''


The runbook system consists of two complementary parts:
=== Legal/Detention Runbook ===
''(Planned - protocols for arrest situations, legal representation, communication restrictions, and professional obligations during detention)''


# '''Information Repository''': Secure storage of critical data (credentials, contact information, serial numbers)
== System Architecture ==
# '''Procedure Guides''': Step-by-step protocols for specific scenarios


=== Storage and Access ===
=== Information Separation ===
Runbooks contain only procedural guidance. Sensitive information (account numbers, contact details, medical information) is stored separately in encrypted password managers and secure document storage.


Runbooks are maintained in multiple formats and locations:
=== Access Methods ===
* '''Digital copies''': Encrypted local storage and cloud backup
* '''Physical copies''': Laminated field guides stored in equipment kits
* '''Memory aids''': Key decision trees memorized for situations where written procedures aren't accessible


* Encrypted local storage
== Implementation Guidelines ==
* Printed copies for field operations
* Cloud backup (encrypted)
* Physical copies at secure locations


== Core Runbook Categories ==
=== Preparation Phase ===
# Study runbook procedures in non-emergency conditions
# Practice key decision trees and communication protocols
# Verify all emergency contact information and backup systems
# Test equipment and communication methods specified in procedures


=== Field Operations ===
=== Activation Phase ===
* '''Equipment failure protocols''': Procedures for handling technical breakdowns in remote locations
# Quickly assess situation to identify applicable runbook
* '''Transportation contingencies''': Alternative transport activation and incident management
# Follow step-by-step procedures without deviation during crisis
* '''Communication fallbacks''': Maintaining connectivity when primary systems fail
# Document actions taken for post-incident analysis
# Communicate status updates per runbook communication protocols


=== Digital Security ===
=== Recovery Phase ===
* '''Access restoration procedures''': Recovery from account lockouts and security breaches
# Complete all follow-up actions specified in applicable runbook
* '''Remote system management''': Controlling and securing systems from alternative locations
# Document lessons learned and system performance during incident
* '''Data protection protocols''': Securing sensitive information during compromises
# Update procedures based on real-world effectiveness
# Brief trusted contacts on incident resolution and system improvements


=== Medical and Personal Safety ===
== System Maintenance ==
* '''Solo emergency procedures''': Self-assessment and evacuation protocols
* '''Emergency contact cascades''': Systematic notification procedures
* '''Location broadcasting methods''': Ensuring help can locate you in crisis


=== Asset Protection ===
=== Regular Testing ===
* '''Theft response procedures''': Immediate security measures and recovery steps
* '''Monthly''': Review contact information and verify system access
* '''Insurance claim protocols''': Documentation and filing procedures
* '''Quarterly''': Full walkthrough of one randomly selected runbook
* '''Replacement workflows''': Minimum viable kit deployment
* '''Semi-annually''': Test all backup communication and access methods
* '''Annually''': Complete system review and update all procedures


== Implementation Guidelines ==
=== Documentation Updates ===
* Update procedures after any real-world activation
* Incorporate lessons learned from training exercises
* Revise based on changes to insurance, equipment, or operating procedures
* Version control all changes with dates and rationale


=== System Maintenance ===
== Usage Philosophy ==


'''Quarterly Tasks:'''
These runbooks assume:
* Verify all stored information remains current
* '''Limited cognitive capacity''' during crisis - procedures must be simple and clear
* Test emergency access procedures
* '''Degraded communication''' - multiple backup methods and clear priorities
* Update contact information
* '''Equipment failure''' - procedures work with minimal tools and technology
* Check physical copy integrity
* '''Time pressure''' - critical actions prioritized in first 15 minutes of each scenario


'''Annual Tasks:'''
The goal is not perfection but rapid, effective response that protects life, maintains operational security, and preserves professional obligations even under adverse conditions.
* Complete system review and testing
* Refresh all physical copies
* Update insurance and policy information
* Review and revise procedures based on experience
 
=== Usage Protocol ===
 
# '''Situation Assessment''': Identify which runbook applies to current crisis
# '''Information Access''': Retrieve necessary data from secure storage
# '''Procedure Execution''': Follow step-by-step protocols
# '''Documentation''': Record actions taken during incident
# '''System Update''': Incorporate lessons learned post-incident
 
== Security Considerations ==
 
* Runbooks contain no sensitive data, only procedures
* All digital copies are encrypted
* Physical access is controlled and monitored
* Regular security reviews of access methods
* Redundant recovery methods prevent single points of failure


== Categories ==
== Categories ==


[[Category:Operations]]
[[Category:Emergency Procedures]]
[[Category:Emergency Procedures]]
[[Category:Documentation]]
[[Category:Field Operations]]
[[Category:Risk Management]]
[[Category:Solo Operations]]
 
{{Navbox Runbooks}}

Latest revision as of 19:46, 7 December 2025

Runbooks are field-tested emergency procedures designed for independent journalists, field workers, and anyone operating alone in remote locations. Each runbook provides step-by-step protocols that can be executed under stress.

Core Emergency Runbooks

Vehicle Failure Runbook

Complete procedures for handling transportation breakdowns during field operations, including safety assessment, damage evaluation, insurance procedures, alternative transportation, and work continuity planning.

Digital Security Incident Runbook

Comprehensive response protocols for account compromises, device theft, and system access loss, covering immediate isolation, account recovery, source protection, and system restoration.

Solo Medical Emergency Runbook

Emergency medical procedures for serious illness or injury when working alone, including self-assessment, emergency response, evacuation procedures, and work continuity measures.

Equipment Theft/Loss Runbook

(Planned - procedures for securing systems after equipment theft, insurance claims, replacement workflows, and maintaining operational security)

Legal/Detention Runbook

(Planned - protocols for arrest situations, legal representation, communication restrictions, and professional obligations during detention)

System Architecture

Information Separation

Runbooks contain only procedural guidance. Sensitive information (account numbers, contact details, medical information) is stored separately in encrypted password managers and secure document storage.

Access Methods

  • Digital copies: Encrypted local storage and cloud backup
  • Physical copies: Laminated field guides stored in equipment kits
  • Memory aids: Key decision trees memorized for situations where written procedures aren't accessible

Implementation Guidelines

Preparation Phase

  1. Study runbook procedures in non-emergency conditions
  2. Practice key decision trees and communication protocols
  3. Verify all emergency contact information and backup systems
  4. Test equipment and communication methods specified in procedures

Activation Phase

  1. Quickly assess situation to identify applicable runbook
  2. Follow step-by-step procedures without deviation during crisis
  3. Document actions taken for post-incident analysis
  4. Communicate status updates per runbook communication protocols

Recovery Phase

  1. Complete all follow-up actions specified in applicable runbook
  2. Document lessons learned and system performance during incident
  3. Update procedures based on real-world effectiveness
  4. Brief trusted contacts on incident resolution and system improvements

System Maintenance

Regular Testing

  • Monthly: Review contact information and verify system access
  • Quarterly: Full walkthrough of one randomly selected runbook
  • Semi-annually: Test all backup communication and access methods
  • Annually: Complete system review and update all procedures

Documentation Updates

  • Update procedures after any real-world activation
  • Incorporate lessons learned from training exercises
  • Revise based on changes to insurance, equipment, or operating procedures
  • Version control all changes with dates and rationale

Usage Philosophy

These runbooks assume:

  • Limited cognitive capacity during crisis - procedures must be simple and clear
  • Degraded communication - multiple backup methods and clear priorities
  • Equipment failure - procedures work with minimal tools and technology
  • Time pressure - critical actions prioritized in first 15 minutes of each scenario

The goal is not perfection but rapid, effective response that protects life, maintains operational security, and preserves professional obligations even under adverse conditions.

Categories


📋 Runbooks
Setup Runbooks · New Computer Runbook
Emergency Medical Emergency · Vehicle Failure · Security Incident
Comms Emergency Communications · PGP Communication Guide
Reference Technical · Field Operations